Author of the publication

A Graph-Based Approach to Designing Parallel Multipliers over Galois Fields Based on Normal Basis Representations.

, , and . ISMVL, page 158-163. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Aoki, Takafumi
add a person with the name Aoki, Takafumi
 

Other publications of authors with the same name

Toward Biomolecular Computers Using Reaction-Diffusion Dynamics., , , and . IJNMC, 1 (3): 17-25 (2009)Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation., , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 50-64. Springer, (2017)A multi-finger knuckle recognition system for door handle., , and . BTAS, page 1-7. IEEE, (2013)An Image Completion Algorithm Using Occlusion-Free Images from Internet Photo Sharing Sites., , , and . IEICE Transactions, 91-A (10): 2918-2927 (2008)A Dental Radiograph Recognition System Using Phase-Only Correlation for Human Identification., , , , , and . IEICE Transactions, 91-A (1): 298-305 (2008)A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks., , , , and . IEICE Transactions, 91-A (1): 193-202 (2008)Translation-invariant scene grouping., , , and . ACPR, page 234-238. IEEE, (2011)An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks., , , , , and . FDTC, page 95-102. IEEE Computer Society, (2012)Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules., , , , , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 66-78. Springer, (2009)Quaternary Debiasing for Physically Unclonable Functions., , , and . ISMVL, page 7-12. IEEE Computer Society, (2018)